Happy Monday fellow Linux geeks and Open Source enthusiasts! In this week's newsletter we examine real-time alerting strategies with the snort network intrusion detection system and how to configure them to alert you of possible intrusion events, explore the anatomy of a fileless malware attack on Linux and how to protect against this growing threat, and offer insight into the mission behind our site, our history and the content we provide.

Have a question about or a comment on one of this week's articles?  Let's discuss! Read on to get the details on these critical topics.

Yours in Open Source,

Brittany Signature 150

Real-Time Alerting with Snort

Learn about real-time alerting strategies with the snort network intrusion detection system and how to configure them to alert you of possible intrusion events.
13.Lock StylizedMotherboard

Learn more about real time alerting with snort

Pulling Back the Curtain: About LinuxSecurity.com

Welcome to LinuxSecurity.com - the community's central source for information on Linux and open source security since 1996. Whether you’re a new visitor or a long-time community member, this article will provide you with insight into the mission behind our site, our history and the content we provide.
1.Penguin Landscape

Learn more about pulling back the curtain about linuxsecurity com

 

Fileless Malware on Linux: Anatomy of an Attack

What exactly is fileless malware and how does a fileless malware attack on Linux work? This article will provide you with answers to these questions by honing in on the anatomy of a Linux fileless malware attack - equipping you with the knowledge necessary to secure your systems and your data against this stealthy, malicious threat.
11.Locks IsometricPattern

Learn more about fileless malware on linux